Organizations’ current password usage and policies leaving businesses and employees vulnerable to cyberattacks Stockholm, March 8, 2022 — Password-related attacks are on the rise. Stolen user credentials including name, email and password were the most common root cause of... Read More
Specops Software Blog
How to delegate password reset permissions in Active Directory
Least privilege access is a crucial part of security that protects against overprovisioning user permissions. Even with IT technicians, and junior administrators, this needs to be considered when configuring permissions in the environment. A case in point is helpdesk... Read More
What is Active Directory? A brief overview…
Active Directory, commonly referred to as AD (not to be confused with Azure AD) was developed by Microsoft and first released as a centralized domain directory service with Windows 2000 Server Edition. Since its original release, AD has gone... Read More
SSO vs Enterprise Password Manager: Which is better for reducing your password risk?
Organizations looking to reduce the burden of passwords on their users often consider Single Sign On (SSO) vendors or deploying an enterprise password manager. Each has their advantages, so which one is best for an organization to choose? Single-sign... Read More
CISA Shields Up: How to prepare for the Russia-Ukraine cybersecurity hazard
CISA issues ‘Shields Up’ alert to warn US companies about potential Russian hacking attempts to disrupt essential services and critical infrastructure as the Russia-Ukraine crisis escalates. Get ahead of the situation with essential information. You may have seen the... Read More
Active Directory privilege escalation
There is no shortage of vulnerabilities and risks in today’s digital world. Attackers are using any way possible to compromise business-critical data. However, one of the prevalent ways cybercriminals can get a foothold into your environment is by compromising... Read More
TCP port 21 FTP vulnerabilities
Since the birth of the Internet, one of the exciting capabilities it has enabled is the ability to transfer data from one place to another over long distances. One of the first protocols designed for transferring files from one... Read More
Zero to hero: save your org from cyber-attack with a zero trust model
Zero trust mentality: sounds kinda harsh, doesn’t it? Here at Specops it doesn’t mean we can’t trust our colleagues not to eat our yogurt out of the office fridge, but it does mean we lock our computers before leaving... Read More
UK’s National Crime Agency discovers 585 million compromised passwords in cloud storage facility
Today, Specops Software announced the addition of over 230 million compromised passwords to its Breached Password Protection database. This latest update comes from both its own internal attack monitoring systems as well as the addition of hundreds of millions... Read More
Corporate account takeover attacks and prevention
Corporate account takeover is a form of identity theft, wherein an unauthorized entity steals and assumes an employee’s digital identity, to perform actions on behalf of that user, while remaining undetected. The popularity of corporate account takeover attacks lies in their afforded safeguards for bad actors.... Read More